Ed.D.
Founder Applied Network Defense and Rural Tech Fund
Former Mandiant, InGuardians, DoD
Author: Intrusion Detection Honeypots, Practical Packet Analysis, Applied NSM
GenAI uses em dashes, in part, because it was trained on material written by authors like me. Without our consent, might I add.
The machines can pry my em dashes from my cold, dead hands.
GenAI uses em dashes, in part, because it was trained on material written by authors like me. Without our consent, might I add.
The machines can pry my em dashes from my cold, dead hands.
A public-facing web server is no longer accessible from the browser. Your director believes a denial of service attack may be the cause.
What do you look for to investigate the cause of the availability issue?
#InvestigationPath #DFIR #SOC
A public-facing web server is no longer accessible from the browser. Your director believes a denial of service attack may be the cause.
What do you look for to investigate the cause of the availability issue?
#InvestigationPath #DFIR #SOC
A helpdesk tech reports that after installing an update for a third-party remote management tool, outbound connections to 45.77.XX.XX:8080 from its service started appearing across multiple endpoints.
A helpdesk tech reports that after installing an update for a third-party remote management tool, outbound connections to 45.77.XX.XX:8080 from its service started appearing across multiple endpoints.
While attending a conference, a user reports they were connected to a rogue access point for a couple of hours rather than the official conference wifi.
What do you look for to investigate the impact of the incident?
#InvestigationPath #DFIR #SOC
While attending a conference, a user reports they were connected to a rogue access point for a couple of hours rather than the official conference wifi.
What do you look for to investigate the impact of the incident?
#InvestigationPath #DFIR #SOC
youtube.com/shorts/yaZW...
youtube.com/shorts/yaZW...
securityonionsolutions.com/conference/
securityonionsolutions.com/conference/
Someone inside your network opened a file containing a honeytoken. The file is a spreadsheet on a web server that isn't linked anywhere publicly facing.
What do you look for to investigate whether an incident occurred?
#InvestigationPath #DFIR #SOC
Someone inside your network opened a file containing a honeytoken. The file is a spreadsheet on a web server that isn't linked anywhere publicly facing.
What do you look for to investigate whether an incident occurred?
#InvestigationPath #DFIR #SOC
#space #astronomy #science #geology #STEM
#space #astronomy #science #geology #STEM
...create atmospheric and solar irradiance profiles
...collect temperature and pressure readings
...detect levels of UV and IR radiation in the upper atmosphere
...create atmospheric and solar irradiance profiles
...collect temperature and pressure readings
...detect levels of UV and IR radiation in the upper atmosphere
Let's say that you observed the download of a suspicious file, but it's no longer located on the file system.
Let's say that you observed the download of a suspicious file, but it's no longer located on the file system.
A Windows prefetch file named RUNDLL32.EXE-3A2B9C71[.]pf shows a referenced file at C:\Users\Public\update.dll, but the DLL is missing.
You're unable to collect a memory dump and no EDR is available.
A Windows prefetch file named RUNDLL32.EXE-3A2B9C71[.]pf shows a referenced file at C:\Users\Public\update.dll, but the DLL is missing.
You're unable to collect a memory dump and no EDR is available.
AV on a point of sale system flags a new startup entry named “PSLService.exe” in C:\Users\Public\Kiosk\.
Festive fall plugin or cred stealer? Something else?
What are your first few moves to investigate this finding?
#InvestigationPath #DFIR #SOC
AV on a point of sale system flags a new startup entry named “PSLService.exe” in C:\Users\Public\Kiosk\.
Festive fall plugin or cred stealer? Something else?
What are your first few moves to investigate this finding?
#InvestigationPath #DFIR #SOC
You've come across a log for the following execution:
msiexec.exe /i "\\10.0.0.5\share\patch.msi" /qn
The file is not available on the remote host.
What do you look for to investigate whether an incident occurred?
#InvestigationPath #DFIR #SOC
You've come across a log for the following execution:
msiexec.exe /i "\\10.0.0.5\share\patch.msi" /qn
The file is not available on the remote host.
What do you look for to investigate whether an incident occurred?
#InvestigationPath #DFIR #SOC
A user reported that their workstation appears to reboot every night.
Unfortunately, due to admin error, Windows Event logging is disabled on the host.
What do you look for to investigate whether an incident occurred?
#InvestigationPath #DFIR #SOC
A user reported that their workstation appears to reboot every night.
Unfortunately, due to admin error, Windows Event logging is disabled on the host.
What do you look for to investigate whether an incident occurred?
#InvestigationPath #DFIR #SOC